/pcq/media/media_files/2025/03/24/1iSTF04B6heqJgV5LQCl.webp)
Steam Game Downloads Used to Target Users with Malware
Bad news for PC gamers: Steam got used to delivering malware. A game called Sniper: Phantom’s Resolution, which looked legit, contained malware that stole user data. Weeks after, another Steam game, PirateFi, was found to be spreading Vidar infostealer malware to 1,500 people. What’s going on with game marketplaces and vulnerabilities that cybercriminals can exploit?
How the Malware Spread In Steam Game
In this attack, cybercriminals use Steam’s submission process to upload legit infected games. Here’s how it works:
• Disguised as a Game Demo—The infected files are hosted on “Steam’s store,” so it will look like a demo game.
• Advanced Obfuscation—The code hides itself in the installer as a regular Windows activity.
• Persistence Mechanisms—Once on the victim’s machine, malware will be persistent through backdoors, at the very least.
• Data Theft—Targeting login credentials to browsers, stolen cookies, cryptocurrency wallets, etc.
These tactics allowed the malware to evade detection for days, affecting an unknown number of users before Steam took action.
Why is this a problem?
What makes these attacks especially bad is that they happened in the Steam ecosystem, which has been trusted by millions of people. This means critical security issues:
1. Platform Trust is being Broken—Gamers trust Steam to filter out malicious content, but this attack shows a different kind of security threat can bypass traditional filtering and gaming safeguards.
2. Suppliers in Attacks, Rapid Infection—Attackers can deploy games that can have thousands of downloads, a way to spread massively in a short period of time.
3. Advanced Hacking Techniques—The hacking method allows privilege escalation, encryption, and obfuscation to evade detection.
4. Steam didn’t detect it—In the case of Sniper: Phantom’s Resolution and PirateFi, it was the users who raised the alarm first and not Steam.
Steam’s Response and Security Measures
When games were found to be malware and scams, Steam removed the games and banned the developers. Affected Steam users were instructed to:
• Run a full system antivirus scan.
• Change passwords across Steam and other online accounts.
• Enable two-factor authentication (2FA).
• Reinstall OS as deemed necessary. While these are all good measures, it’s too late.
These were measures after significant damage had been done, again showing that Steam’s moderation and filtering are lacking as a growing platform.
How Gamers Can Protect Themselves
Protecting Yourself as a Gamer While gaming platforms have to protect users, you can also make decisions to lower the probability of a bad experience:
1. Download from an official source only—Don't go to third parties or links, even if mentioned in-game descriptions.
2. Use good security software—Update your antivirus and scan.
3. Read game comments—Comment sections, and news wires regarding game or software issues. Be cautious with games that have only positive comments or very little response.
4. Enable MFA—Use multi-factor authentication (MFA) for accounts. It doesn't eliminate risk but adds another layer of security.
5. Review account activity—Steam has a login history, and the account settings page shows devices logged and connected to your account for any unusual activity.
6. Back up important files—If your device is infected with malware, a backup will minimize the damage to files that are otherwise non-recoverable from attacks and loss.
7. Be wary of suspicious promotions—Keep your guard up if a deal looks too good to be true considering the risks of online gaming.
The Need for Stronger Security Measures
To avoid future problems from happening, a digital game store like Steam needs to do the following:
• Create and implement more advanced malware detection, using sandboxing and behavior-based analysis.
• Add more ways to verify developers so fraudulent accounts can't upload a game with malware from a developer account.
• Take action when needed to improve response to user reports and trending suspicious activity.
• If a breach happens, be honest and transparent and alert other players to the vulnerability.
Game Over? Steam’s Security Directive Needs an Overhaul.
With Steam games infested with malware, it’s clear companies are just as vulnerable as the games themselves. Cybercriminals are exploiting those vulnerabilities using malware and social engineering to game the system, and gaming companies and gamers themselves need to level up their cybersecurity.
Until the processes for supporting security are super secure, gamers should consider it a must, not a maybe, to protect their online identity and personal info. Online gaming is a target for cybercriminals, and protecting your online identity and gaming account is not an option.